نتایج جستجو برای: pair wise least significant bit matching

تعداد نتایج: 1779437  

2001
Holger Bech Nielsen Paul H. Frampton Sheldon L. Glashow Thomas W. Kephart Ryan M. Rohm

Finite groups are of the greatest importance in science. Loops are a simple generalization of finite groups: they share all the group axioms except for the requirement that the binary operation be associative. The least loops that are not themselves groups are those of order five. We offer a brief discussion of these loops and challenge the reader (especially Holger) to find useful applications...

2002
Marc VAN DROOGENBROECK Jérôme DELVAUX

Many information hiding techniques have recently been analyzed as they could help manage part of the digital rights. Among the general framework of information hiding, the focus has been put on steganography and on watermarking techniques. This paper proposes an entropy based technique for data embedding in images with a specific target, sometimes referred to as feature location: inclusion of a...

Journal: :IEEE Signal Process. Lett. 2007
Weiming Zhang Xinpeng Zhang Shuozhong Wang

In image steganography, a pixel can carry secret bits by choosing adding/subtracting one to/from the gray value. This kind of “ 1 steganography” can hide a longer message than simple LSB embedding. We propose a double-layered embedding method for implementing “ 1 steganography,” in which binary covering codes and wet paper codes are used to hide messages in the LSB plane and the second LSB plan...

2002
Sorina Dumitrescu Xiaolin Wu Zhe Wang

This paper introduces a new, principled approach to detecting LSB steganography in digital signals such as images and audio. It is shown that the length of hidden message embedded in the least significant bits of signal samples can be estimated with relatively high precision. The new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB emb...

Journal: :Digital Signal Processing 2015
Jiu-fen Liu Yu-guo Tian Tao Han Chun-fang Yang Wen-bin Liu

Article history: Available online xxxx

2005
Rainer Böhme

This paper proposes multiple regression models as a method for quantitative evaluation of the accuracy in steganalysis with respect to various moderating factors, such as parameter choice of the detector and properties of the carrier object. The case for multivariate statistical inference in steganalysis is particularly relevant: recent findings suggest that type and characteristics of carrier ...

Journal: :CoRR 2014
Benedikt Boehm

Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is...

Journal: :CoRR 2014
Jianbiao Lin Ke Ji Hui Lin Enyan Wu Xin Gao

This paper proposes a tag identify approach based on fragile Watermark that based on Least significant bit of the replacement that we first use a special way to initialize the cover to ensure that we can use random positions to embed the information of tag. Using this way enhance the security of other to get the right information of this tag. Finally as long as the covered information can be de...

2007
Kwangsoo Lee Andreas Westfeld Sangjin Lee

We present a generalised and improved version of the category attack on LSB steganography in JPEG images with straddled embedding path. It detects more reliably low embedding rates and is also less disturbed by double compressed images. The proposed methods are evaluated on several thousand images. The results are compared to both recent blind and specific attacks for JPEG embedding. The propos...

Journal: :IEEE Trans. Computers 2000
Marc Joye Sung-Ming Yen

This paper describes new methods for producing optimal binary signed-digit representations. This can be useful in the fast computation of exponentiations. Contrary to existing algorithms, the digits are scanned from left to right (i.e., from the most significant position to the least significant position). This may lead to better performances in both hardware and software.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید